Learn about the NAVSO P-5239-26 method
NAVSO P-5239-26 is a software-based Data Sanitization method used in various file shredder and data shredder programs to overwrite existing information on a hard drive or other storage device.
Erasing your hard drive with the NAVSO P-5239-26 method will prevent all software-based file recovery methods from getting the information from the drive, and also prevent most hardware-based recovery methods. extract information.
How does NAVSO P-5239-26 method work?
Methods to delete data NAVSO P-5239-26 are usually carried out in the following way:
- 1st time - Override a character (e.g. 1)
- 2nd - Override another character (e.g. 0)
- 3rd - Overwrite a random character and verify the record
The NAVSO P-5239-26 method that the article listed above is the standard way that most data destruction programs perform. However, according to actual specification, this is a less effective alternative.
Preferred method involves a more complex type of override.
Erasing the hard drive with the NAVSO P-5239-26 method will prevent all software-based file recovery methods from retrieving the information from the drive.Origin of NAVSO P-5239-26
The NAVSO P-5239-26 method was originally defined in Navy Staff Office Publication 5239 Module 26: Information Systems Security Program Guidelines , published by the US Navy.
You can read the Data Sanitization specification of NAVSO P-5239-26 in sections 3.3.c.1 and 3.3.c.2 of NAVSO 5239-26 by following the link:
https://fas.org/irp/doddir/navy/5239_26.htm
It is unclear whether the US Navy is still using NAVSO P-5239-26 as a software-based data deletion standard.
In fact, most data destruction programs support a variety of data deletion methods besides NAVSO P-5239-26.
You should read it
- Learn about Gutmann data deletion method
- Learn about the method of clearing DoD 5220.22-M data
- Learn about the Write Zero method
- What is the Random Data method?
- What is Data Sanitization? Are there any Data Sanitization methods?
- 25 Free File Shredder software deletes security data for computers
- What is the Schneier (Data Sanitization) method?
- What is Secure Erase?
- 4 tips or data protection on iPad
- How to Recover Your Deleted Files in Windows
- Tips for recovering selected data for iPhone
- Hash Table data structure